Information Security Buzz

A Brief History of Ransomware

Ransomware’s Early Days

The first documented and purported example of ransomware was the 1989 AIDS Trojan, also known as PS Cyborg. Harvard-trained evolutionary biologist Joseph L. Popp sent 20,000 infected diskettes labeled “AIDS Information – Introductory Diskettes” to attendees of the World Health Organization’s international AIDS conference.

But after 90 reboots, the Trojan hid directories and encrypted the names of the files on the customer’s computer. To regain access, the user would have to send $189 to PC Cyborg Corp. at a post office box in Panama. Dr. Popp was eventually caught but never tried for his scheme as was declared unfit to stand trial. His attorney said he began wearing a cardboard box on his head to protect himself from radiation.

Fast Forward to the Internet Age

With the Internet making it easier to carry out Popp’s ransom idea, cyber criminals began to realize that they could monetise ransomware on a far wider scale.

In 2006, criminal organisations began using more effective asymmetric RSA encryption.

The New Wave

Starting 2011, ransomware moved into big time. About 60,000 new ransomware was detected in Q3 2011, and more than doubled in Q3 2012, to over 200,000. What’s most astounding is that ransomware more than quadrupled from Q3 2014 to Q1. 2015.

Image 1 1With no signs of slowing down, there are now many, many ransomware variants. Here’s a brief rundown of the ones you should know:

CryptoLocker – first versions appear to have been posted September 2013

Locker – first copycat software emerged in December 2013

CryptoLocker 2.0 – a new and improved version of CryptoLocker was found in December 2013

CryptorBit – a new ransomware discovered in December 2013

CTB-Locker (Curve-Tor-Bitcoin Locker) – discovered midsummer 2014

SynoLocker – appeared in August 2014

CryptoWall – rebranded from CryptoDefense in April 2014

Cryptoblocker – new ransomware variant emerged in July 2014

OphionLocker – surprise! Another ransomware released during the holidays, December 2014

Pclock – greets the New Year, January 2015 by miming CryptoLocker

CryptoWall 2.0 – ransomware goes on steroids in January 2015

TeslaCrypt – a new CryptoWall variant surfaced in February 2015

VaultCrypt – pretended to be customer support in February 2015

CryptoWall 3.0 – a new version appeared March 2015

CryptoWall 4.0 – 6 months later, in September 2015, a new variant is on the loose

LowLevel04 this file-encrypting ransomware greeted us in October 2015

And finally, a game changer known as Chimera – November 2015

[su_box title=”Kieran Laffan, engineer, Varonis” style=”noise” box_color=”#0e0d0d”] Kieran Laffan, is engineer, at Varonis. Varonis is the leading provider of software solutions for unstructured, human-generated enterprise data. Varonis provides an innovative software platform that allows enterprises to map, analyze, manage and migrate their unstructured data. Varonis specializes in human-generated data, a type of unstructured data that includes an enterprise’s spreadsheets, word processing documents, presentations, audio files, video files, emails, text messages and any other data created by employees. This data often contains an enterprise’s financial information, product plans, strategic initiatives, intellectual property and numerous other forms of vital information. IT and business personnel deploy Varonis software for a variety of use cases, including data governance, data security, archiving, file synchronization, enhanced mobile data accessibility and information collaboration. As of March 31, 2015, Varonis had approximately 3,500 customers, spanning leading firms in the financial services, public, healthcare, industrial, energy & utilities, technology, consumer and retail, education and media & entertainment sectors.[/su_box]

About the Author

Exit mobile version